U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
New FAR Clause Establishes Minimum Data Security Requirements for Federal Contractors
1. New FAR Clause Establishes Minimum Data Security Requirements for
September 4, 2012 Federal Contractors
Government Contracts Law Client Alert
This Alert provides only With Congress unable to pass cybersecurity legislation by the August recess, the
general information and executive agencies are proceeding to regulate government contractors with access to
should not be relied upon as government information. Specifically, on August 24, 2012, the Federal Acquisition
Regulation (FAR) Council proposed a new clause requiring contractors to maintain
legal advice. This Alert may
minimum data protection standards. Comments on the proposal are due October 23,
be considered attorney 2012. As explained below, GSA already has in place cybersecurity standards for its
advertising under court and contractors, and DoD has proposed its own set of rules. These specific agency rules
bar rules in certain take precedent over this new FAR clause.
jurisdictions.
Once final, the new FAR clause will apply to civilian, DoD and NASA contracts exceeding
the simplified acquisition threshold ($150,000), including commercial acquisitions. The
For more information, contact
clause must be flowed down to subcontracts at any tier. The new clause, which will be in
your Patton Boggs LLP FAR Part 52.204, identifies seven basic safeguards for contractor information systems
attorney or the author listed through which nonpublic information generated by or for government either resides or
below. transits. The basic safeguards are:
1. Government information may not be processed on computers without access control or
Mary Beth Bosco located in public areas. Similarly, government information cannot be posted on a public
mbbosco@pattonboggs.com website. If posted to a web site, the site must control access either through user
WWW.PATTONBOGGS.COM
identification or password, user certificate or other technical means, and must provide
protection via use of security technologies.
2. Electronic information may be transmitted only on systems that utilize technologies and
processes that provide the best level of security and privacy available, given facilities,
conditions and environment.
3. Transmission by voice or fax may only occur when the sender has a reasonable
assurance that access is limited to authorized recipients.
4. Systems must be protected by at least one level of physical barrier and one level of
electronic barrier, such as lock and key in conjunction with a password, when not in the
direct control of the individual user.
5. Media that is being released or discarded must be cleared and sanitized. Overwriting is
an acceptable method of sanitizing, and the clause refers to the National Institute of
Standards and Testing's (NIST) protocols for clearing computers. NIST Publication 800-88,
Guidelines for Media Sanitization.
6. The contractor must provide at least the following means of intrusion protection: Current
and regularly updated malware protection, such as anti-virus software and anti-spyware
software; and prompt application of security-related upgrades and patches.
2. 7. Information may only be transferred to those subcontractors with a contractual need to
have the information and who employ the safeguards described in the clause.
While the clause’s requirements are very general, covered contractors will need to review
not just their hardware and software systems, but their facilities, employee practices,
record-keeping systems, and subcontract relationships in order to ensure compliance.
For example, contractors should make sure they have policies in place so that employees
working from home comply with the clause’s security requirements.
In addition, government contractors must be aware that GSA already has more fulsome
cybersecurity regulations in place, and that DOD has proposed a comprehensive set of
rules. In brief, GSA’s regulations require contractors to have an IT security plan for each
contract that is approved by the Contracting Officer. Contractors must also supply evidence
of either a self or third-party-certified security authorization, the components of which are
defined by GSA’s regulations. The regulations also contain notification requirements for
cyber breaches and GSA inspection rights.
DOD's proposal mandates reporting of cyber incidents affecting designated DOD
information within 72 hours of discovery. In addition to incident reporting, contractors will
need to take immediate action to support forensic activities. These actions include an
immediate review of the system to identify compromised computers, servers and user
accounts; identification of the specific DOD information that has been affected; and
preservation of the known affected systems and any corresponding capture data. In the
event DOD determines to perform its own damage assessment, the contractor will be
required to comply with all information requests and cooperate with DOD's investigation.
The DOD regulations are not expected to become final before the end of the year.
This Alert provides only general information and should not be relied upon as legal advice. This Alert may also be considered
attorney advertising under court and bar rules in certain jurisdictions.
WASHINGTON DC | NEW JERSEY | NEW YORK | DALLAS | DENVER | ANCHORAGE | DOHA, QATAR | ABU DHABI, UAE | RIYADH, SAUDI ARABIA